diff options
author | davjohn <david.cla2@gmail.com> | 2017-03-02 22:58:28 +0700 |
---|---|---|
committer | Willy Sudiarto Raharjo <willysr@slackbuilds.org> | 2017-03-02 22:58:28 +0700 |
commit | d9935e73b64a352af06be60cfadfa85c5f8c8e09 (patch) | |
tree | 7a9fb7b489dba75c0827ea6be41a11cff326176c /network/psad/slack-desc | |
parent | b536f66ef48f7b24a28af98bb95f703c50f47396 (diff) | |
download | slackbuilds-d9935e73b64a352af06be60cfadfa85c5f8c8e09.tar.gz |
network/psad: Updated for version 2.4.4.
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'network/psad/slack-desc')
-rw-r--r-- | network/psad/slack-desc | 7 |
1 files changed, 3 insertions, 4 deletions
diff --git a/network/psad/slack-desc b/network/psad/slack-desc index 9624bb23c7..007143d490 100644 --- a/network/psad/slack-desc +++ b/network/psad/slack-desc @@ -10,10 +10,9 @@ psad: psad (Intrusion Detection and Log Analysis with iptables) psad: psad: psad is a collection of three lightweight system daemons (two main psad: daemons and one helper daemon) that run on Linux machines and analyze -psad: iptables log messages to detect port scans and other suspicious -psad: traffic. -psad: A typical deployment is to run psad on the iptables firewall where -psad: it has the fastest access to log data. +psad: iptables log messages to detect port scans and other suspicious. +psad: traffic. A typical deployment is to run psad on the iptables firewall +psad: where it has the fastest access to log data. psad: psad: Homepage: http://www.cipherdyne.org/psad/ psad: |